Method and system for prevention of windowless screen capture
a windowless and screen capture technology, applied in the field of computer security, can solve the problem that the user is not able to perform a screen capture when he needs, and achieve the effects of reducing the number of false positive determinations, high security, and improving user experien
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
example
Discriminating Between Malicious and Non-Malicious Processes
[0024]An example of a malicious process is the recently discovered FAKEM RAT (http: / / www.trendmicro.com / cloud-content / us / pdfs / security-intelligence / white-papers / wp-fakem-rat.pdf), which uses its own process (“the malware typically copies itself using the name, tpframe.exe, to the %System% folder”), and is capable of taking screenshots (“takes a snapshot of the desktop”).
[0025]In contrast, various remote management software (e.g. Symantec PC-Anywhere) need to take screenshots of the user's desktop, while (in some cases) not having a visible window at such time.
[0026]By using the exemplary embodiments, it is possible to discriminate between a non-malicious management software, which is identified as non-malicious by its behavior, because at least some of its windows are visible and / or because they have been white-listed and malicious processes. The exemplary embodiments provide a simple and yet efficacious tool to fight malic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 